نتایج جستجو برای: Flow control
تعداد نتایج: 1748261 فیلتر نتایج به سال:
smart home is composed of several controllers with different plants in control. if each controller works independently, without considering the mutual effect of the others in the control process, the whole system could definitely not converge to an optimum desired status and may not ever reach the demanded condition. the function of different controller system may has conflict in some condition...
administrative regulations for water flow decrease distribution efficiency and effect the economical operation of irrigation networks. complications in distribution systems and the decrease in availability of water require study of the hydraulic performance of existing flow control structures. control systems designed by neyrpic (zayandeh rud network) and usbr (doroodzan network) were investiga...
flow passing through lateral intakes and channel junctions is turbulent. sediment flow and bed forms areaffected by these flow patterns and vice versa. in this research, a laboratory study was carried out toexplore a possible method for sediment control for a set of submerged vanes and a single spur dikesimultaneously. since a larger portion of the near-bed flow was diverted, the intake receive...
we consider a grid network where nodes contain small buffers. a packet that faces a crowded buffer in its route will get extra latency and may be dropped. in this paper, we propose a novel flow control protocol called rfcc for grid networks. rfcc tries to reroute delayed packets and utilizes network coding to introduce a configurable amount of redundant information in the network, thereby incre...
Many applications exhibit iterative and phase-based behavior. We present an approach to detect and analyze iteration phases in applications by recording the execution control flow graph of the application and analyzing it for loops that represent iterations. Phases are then manually marked and performance profiles are captured in alignment with the iterations. By analyzing how profiles change b...
Application or business logic, used in the development of services, has to do with the operations that define the application functionalities and not with the platform ones. Often security problems can be found at this level, because circumventing or misusing the required operations can lead to unexpected behaviour or to attacks, called application logic attacks. We investigate this issue, by u...
Control-Flow Integrity (CFI) means that the execution of a program dynamically follows only certain paths, in accordance with a static policy. CFI can prevent attacks that, by exploiting buffer overflows and other vulnerabilities, attempt to control program behavior. This paper develops the basic theory that underlies two practical techniques for CFI enforcement, with precise formulations of hy...
This paper presents a new representation of control flow graphs which is readable and concise, keeping all pertinent information as it appears in the source code. The iconic control graph provides an exact transformation of the source code. It is a basis for control flow visualization, unstructuredness identification, path crossing and path computation. The representation is programming-languag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید